Analysis

  • max time kernel
    216s
  • max time network
    222s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2023, 19:31

General

  • Target

    Nova pasta/Process_Hacker_-_Undetected.exe

  • Size

    10.1MB

  • MD5

    38aaf0d0974dabea141bb993cd4042e2

  • SHA1

    7c13b69fb7c3bcce41c3f4bf425966eec987c017

  • SHA256

    42ae95cd0808c7221b8a80cc4fc01c69cceac2b72a6eed95e2c04d563be55a56

  • SHA512

    e80c046e0413b3a8ec748e44452833d2ce9de0b22a95dbaac5ffb4552af922f539a65ce3b6430c303913814a718835cfdeed5d49b4cd831984b1f5c6c7beaedb

  • SSDEEP

    196608:jc9vfisVBb9mvOa3IzRvTj7GGnplRfq0aC2b/9MOE4JFnAzfAFlJ80NntBna2BYI:I9vfRetO37GGnpzfACfQnAzw/va2Xt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nova pasta\Process_Hacker_-_Undetected.exe
    "C:\Users\Admin\AppData\Local\Temp\Nova pasta\Process_Hacker_-_Undetected.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\Nova pasta\ph.dat
      "C:\Users\Admin\AppData\Local\Temp\Nova pasta\ph.dat"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Users\Admin\AppData\Local\Temp\evbCA56.tmp
        "C:\Users\Admin\AppData\Local\Temp\Nova pasta\87675643324.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\80EB2F5C

    Filesize

    14B

    MD5

    33c7088a69d5b0df397408286608762a

    SHA1

    c2d9477d58549d2c3e60f469f49d3f6d0b1b1a41

    SHA256

    1e94329a83b6ebccc85020c37797422a416d1b459c04fd256a6e05a45093fca9

    SHA512

    7ceac70bf1d06ba1eab310f8958026a19c0a4b76fdacc1843481e9c43d5e7016580d00e262a2a7de3fd18b22c628ca39cac18a15949ad85ae72237f0d818c4d7

  • C:\Users\Admin\AppData\Local\Temp\Nova pasta\ph.dat

    Filesize

    7.2MB

    MD5

    4a0a94325f1a9b6274638d8c59978357

    SHA1

    10c568775f333c6ce5ac598696c91e9c22c40292

    SHA256

    e73c3125b302479216e5519456fabffabc5120287ef1cabc3b05b1a6dc9f9187

    SHA512

    0e8022487ec79c689ee26eb1aae205407bdb16cb54c8ce26b0a532fc8718c8a40e7df8ea75757ab000aac2d64854bb9fb0bc9b090caf06f3a97d9144c1001611

  • C:\Users\Admin\AppData\Local\Temp\evbCA56.tmp

    Filesize

    1KB

    MD5

    7656680b3a8f608a25173e28875348cc

    SHA1

    9d5e137f66663cbc4ca54d52d7ff0db039e6b9ea

    SHA256

    f628da7fdab49d4f3a6789f1536a24de17bfb6f38d7a54f164bd1cb41e464d07

    SHA512

    49111b57082b6889c55f264056f6bb0dd78dd880e93fce3bb6acc35dab59eba41a13c3666f6a2400c566b9985472e4d55e9b0571401216152e33150eafc34bb7

  • C:\Users\Admin\AppData\Local\Temp\evbCA56.tmp

    Filesize

    1KB

    MD5

    7656680b3a8f608a25173e28875348cc

    SHA1

    9d5e137f66663cbc4ca54d52d7ff0db039e6b9ea

    SHA256

    f628da7fdab49d4f3a6789f1536a24de17bfb6f38d7a54f164bd1cb41e464d07

    SHA512

    49111b57082b6889c55f264056f6bb0dd78dd880e93fce3bb6acc35dab59eba41a13c3666f6a2400c566b9985472e4d55e9b0571401216152e33150eafc34bb7

  • C:\Users\Admin\Pictures\ibif.jy

    Filesize

    32B

    MD5

    7820b6b8eb5bfbdcaeb419a65a402c6c

    SHA1

    37ab0bf2dcccfba042e85ac3ae5aae0b7d317753

    SHA256

    2f304a7cff0f71068da2a4b05f7369a455161f0fbfe479ef57180b14d83bde37

    SHA512

    03c0eca2fa6b024130331942147e8b188fc830fcf3cca9ebb81698f39e6d3220e4625d20c2eeac0874de3655abd35cae2c367a37c2dd7594717b688bc12b7c0a

  • \??\c:\users\admin\appdata\local\temp\80EB2F5C

    Filesize

    14B

    MD5

    33c7088a69d5b0df397408286608762a

    SHA1

    c2d9477d58549d2c3e60f469f49d3f6d0b1b1a41

    SHA256

    1e94329a83b6ebccc85020c37797422a416d1b459c04fd256a6e05a45093fca9

    SHA512

    7ceac70bf1d06ba1eab310f8958026a19c0a4b76fdacc1843481e9c43d5e7016580d00e262a2a7de3fd18b22c628ca39cac18a15949ad85ae72237f0d818c4d7

  • \??\c:\users\admin\appdata\local\temp\80EB2F5C

    Filesize

    14B

    MD5

    33c7088a69d5b0df397408286608762a

    SHA1

    c2d9477d58549d2c3e60f469f49d3f6d0b1b1a41

    SHA256

    1e94329a83b6ebccc85020c37797422a416d1b459c04fd256a6e05a45093fca9

    SHA512

    7ceac70bf1d06ba1eab310f8958026a19c0a4b76fdacc1843481e9c43d5e7016580d00e262a2a7de3fd18b22c628ca39cac18a15949ad85ae72237f0d818c4d7

  • \??\c:\users\admin\appdata\local\temp\nova pasta\ph.dat

    Filesize

    7.2MB

    MD5

    4a0a94325f1a9b6274638d8c59978357

    SHA1

    10c568775f333c6ce5ac598696c91e9c22c40292

    SHA256

    e73c3125b302479216e5519456fabffabc5120287ef1cabc3b05b1a6dc9f9187

    SHA512

    0e8022487ec79c689ee26eb1aae205407bdb16cb54c8ce26b0a532fc8718c8a40e7df8ea75757ab000aac2d64854bb9fb0bc9b090caf06f3a97d9144c1001611

  • \??\c:\users\admin\pictures\ibif.jy

    Filesize

    32B

    MD5

    7820b6b8eb5bfbdcaeb419a65a402c6c

    SHA1

    37ab0bf2dcccfba042e85ac3ae5aae0b7d317753

    SHA256

    2f304a7cff0f71068da2a4b05f7369a455161f0fbfe479ef57180b14d83bde37

    SHA512

    03c0eca2fa6b024130331942147e8b188fc830fcf3cca9ebb81698f39e6d3220e4625d20c2eeac0874de3655abd35cae2c367a37c2dd7594717b688bc12b7c0a

  • \??\c:\users\admin\pictures\ibif.jy

    Filesize

    32B

    MD5

    7820b6b8eb5bfbdcaeb419a65a402c6c

    SHA1

    37ab0bf2dcccfba042e85ac3ae5aae0b7d317753

    SHA256

    2f304a7cff0f71068da2a4b05f7369a455161f0fbfe479ef57180b14d83bde37

    SHA512

    03c0eca2fa6b024130331942147e8b188fc830fcf3cca9ebb81698f39e6d3220e4625d20c2eeac0874de3655abd35cae2c367a37c2dd7594717b688bc12b7c0a

  • memory/1460-4-0x0000000077443000-0x0000000077444000-memory.dmp

    Filesize

    4KB

  • memory/1460-74-0x00000000FFA60000-0x00000000FFE31000-memory.dmp

    Filesize

    3.8MB

  • memory/1460-60-0x0000000000400000-0x0000000000C81456-memory.dmp

    Filesize

    8.5MB

  • memory/1460-0-0x0000000000400000-0x0000000000C81456-memory.dmp

    Filesize

    8.5MB

  • memory/1460-3-0x0000000077442000-0x0000000077443000-memory.dmp

    Filesize

    4KB

  • memory/1460-77-0x0000000000400000-0x0000000000C81456-memory.dmp

    Filesize

    8.5MB

  • memory/1460-56-0x0000000000400000-0x0000000000C81456-memory.dmp

    Filesize

    8.5MB

  • memory/1460-1-0x00000000FFA60000-0x00000000FFE31000-memory.dmp

    Filesize

    3.8MB

  • memory/4048-81-0x00007FF4FDAB0000-0x00007FF4FDE81000-memory.dmp

    Filesize

    3.8MB

  • memory/4048-75-0x00007FFFEB750000-0x00007FFFEB760000-memory.dmp

    Filesize

    64KB

  • memory/4048-101-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-36-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/4048-100-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-42-0x0000000000050000-0x0000000000147000-memory.dmp

    Filesize

    988KB

  • memory/4048-99-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-98-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-97-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-96-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-45-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-95-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-94-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-93-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-92-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-49-0x0000000000050000-0x0000000000147000-memory.dmp

    Filesize

    988KB

  • memory/4048-52-0x0000000000050000-0x0000000000147000-memory.dmp

    Filesize

    988KB

  • memory/4048-53-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4048-54-0x00007FFF6C030000-0x00007FFF6C040000-memory.dmp

    Filesize

    64KB

  • memory/4048-55-0x00007FF4FDAB0000-0x00007FF4FDE81000-memory.dmp

    Filesize

    3.8MB

  • memory/4048-91-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-90-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-89-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-88-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-87-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-70-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-71-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-72-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-73-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-86-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-85-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-76-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-84-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-78-0x0000000000050000-0x0000000000147000-memory.dmp

    Filesize

    988KB

  • memory/4048-79-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-80-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4048-83-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4048-82-0x0000000140000000-0x0000000141063000-memory.dmp

    Filesize

    16.4MB

  • memory/4896-29-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-47-0x00007FF6CEE20000-0x00007FF6CFBCD000-memory.dmp

    Filesize

    13.7MB

  • memory/4896-33-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-48-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-25-0x00007FF6CEE20000-0x00007FF6CFBCD000-memory.dmp

    Filesize

    13.7MB

  • memory/4896-26-0x00007FF6CEE20000-0x00007FF6CFBCD000-memory.dmp

    Filesize

    13.7MB

  • memory/4896-27-0x00007FF6CEE20000-0x00007FF6CFBCD000-memory.dmp

    Filesize

    13.7MB

  • memory/4896-28-0x00007FF6CEE20000-0x00007FF6CFBCD000-memory.dmp

    Filesize

    13.7MB

  • memory/4896-23-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-14-0x00007FF6CEE20000-0x00007FF6CFBCD000-memory.dmp

    Filesize

    13.7MB

  • memory/4896-24-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-35-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-37-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-30-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-44-0x00007FFFEB750000-0x00007FFFEB760000-memory.dmp

    Filesize

    64KB

  • memory/4896-43-0x00007FF4748A0000-0x00007FF474C71000-memory.dmp

    Filesize

    3.8MB

  • memory/4896-32-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB

  • memory/4896-40-0x00007FFF6C030000-0x00007FFF6C040000-memory.dmp

    Filesize

    64KB

  • memory/4896-34-0x00007FFFEBE30000-0x00007FFFEC025000-memory.dmp

    Filesize

    2.0MB